1
Secret Communication
Through Audio For
Defense Applications
INTERNAL GUIDE
MRS.M.MADHURI LATHA
PRESENTED BY,
J.Prathima ...
2
The basic mechanisms for security of data are:
3
•Cryptography was concerned solely with message
confidentiality (i.e., encryption)
•Cryptography is secret writing. Anyb...
4
PROCESS OF
CRYPTOGRAPHY
5
STEGANOGRAPHY:
Steganography comes from the Greek
Word which means covered or secret message.
STEGAN-O-GRAPHY
COVERED + ...
6
• Steganography is a means of storing
information in such a way that it hides private
information and even the existence...
7
8
STEGANOGRAPHY CRYPTOGRAPHY
Unknown message passing Known message passing
Little known technology Common technology
Techn...
9
A Steganography system
Message file
Cover fileCover file
Steg file
(with hidden data)
Steg file
(with hidden data)
Messa...
10
BASIC TYPESBASIC TYPES OFOF STEGOSYSTEMSSTEGOSYSTEMS
Three basic types of stego systems
1. Secret-key stego systems
2. ...
11
STEGnOGrAPhY TYPESSTEGnOGrAPhY TYPES
oPHYSICAL
oDIGITAL
oNETWORK
oSUDOKO PUZZLES
11
.
12
13
oSteganography in Text
oSteganography in Images
oSteganography in Audio
Image steganography
14
15
AUDIO STEGANOGRAPHY
16
17
METHODS OF AUDIO
STEGANOGRAPHY
METHODS OF AUDIO
STEGANOGRAPHY
18
19
20
LSB CODINGLSB CODING
21
Variation in choosing LSBVariation in choosing LSB
22
TERMINOLOGY USED…TERMINOLOGY USED…
• Cover : The data that is visible to the world.
• Embedded: The data to be hidden (...
23
24
WAV
• WAV files are short for waveform audio files.
• Microsoft and IBM first introduced the WAV file.
• The Audio data...
25
26
Stego
Audio
Embedding Process
LSB of the
Data Part
Alternate
Samples of
LSB Data
Audio
Input
Separate
Header
and Data
S...
27
Convert
Binary
to ASCII
Extraction Process
Store LSB of
Data Part
Left Shift of
Previous bit
Stego
Audio
Separate
Heade...
28
LETERSWITH ASCII VALUESAND
CORRESPONDING BINARY VALUES
Letter ASCII Value Corresponding Binary Value
A 065 01000001
U 1...
29
ALGORITHM (FOR EMBEDDING OF
DATA):
ALGORITHM (FOR EMBEDDING OF
DATA):
• Leave the header section of the audio file
unto...
30
SAMPLES OF AUDIO FILE WITH BINARY VALUES BEFORE ANDSAMPLES OF AUDIO FILE WITH BINARY VALUES BEFORE AND
AFTER EMBEDDINGA...
31
• Leave first 50 bytes.
• Start from the 51st byte and store the least
significant bit in a queue.
• Check every altern...
32
EXRACTION OF DATA FROM AUDIO FILE
Sample No. Binary values with
embedded secret data
Bits that are stored in
the
queue
...
33
34
35
• Modern Printers:
o HP and Xerox brand colour laser printers
o Tiny yellow dots are added to each page.
o The dots are...
36
CorPorAte WorLd:
In business world audio data hiding can be used
to hide a secret chemical formula or plans for a
new i...
37
• Difficult to detect and only receiver can detect.
• Avoid ability of degradation and robustness for audio
signals.
• ...
38
• Once algorithm known- confidentiality of
information is lost.
• Hackers may misuse the technique.
• Due to distortion...
39
As EVERY COIN HAS TWO SIDES, this technology
besides
having many benefits to make the internet business
very safe and t...
40
HANKY OUT!!!
THANK YOU
41
Upcoming SlideShare
Loading in …5
×

Finalmarch4 th

574 views

Published on

Published in: Technology
  • Be the first to comment

Finalmarch4 th

  1. 1. 1 Secret Communication Through Audio For Defense Applications INTERNAL GUIDE MRS.M.MADHURI LATHA PRESENTED BY, J.Prathima 09251A0482 S.Spandana 09251A04B0 E.Nikhila 09251AO475 B.Asritha 09251A04C0
  2. 2. 2 The basic mechanisms for security of data are:
  3. 3. 3 •Cryptography was concerned solely with message confidentiality (i.e., encryption) •Cryptography is secret writing. Anybody can see the message, but nobody else can read it. • Usually, this is because its letters have been re- arranged, or replaced by different letters, according to some scheme that only the sender and receiver know. • Only those who possess a secret key can decrypt the message into plain text
  4. 4. 4 PROCESS OF CRYPTOGRAPHY
  5. 5. 5 STEGANOGRAPHY: Steganography comes from the Greek Word which means covered or secret message. STEGAN-O-GRAPHY COVERED + WRITING
  6. 6. 6 • Steganography is a means of storing information in such a way that it hides private information and even the existence of the information within the other medium. • The goal of Steganography is “to hide messages inside other harmless messages, in a way that does not allow any enemy to detect that there is a second secret message present”.
  7. 7. 7
  8. 8. 8 STEGANOGRAPHY CRYPTOGRAPHY Unknown message passing Known message passing Little known technology Common technology Technology still being developed for certain formats Most of algorithms known by all Steaganography does not alter the structure of the secret message. Cryptography alters the structure of secret message.
  9. 9. 9 A Steganography system Message file Cover fileCover file Steg file (with hidden data) Steg file (with hidden data) Message file Steganography ToolSteganography Tool Steganography ToolSteganography Tool Hiding messages Extracting messages
  10. 10. 10 BASIC TYPESBASIC TYPES OFOF STEGOSYSTEMSSTEGOSYSTEMS Three basic types of stego systems 1. Secret-key stego systems 2. Public-key stego systems 3. Pure stego systems 10 .
  11. 11. 11 STEGnOGrAPhY TYPESSTEGnOGrAPhY TYPES oPHYSICAL oDIGITAL oNETWORK oSUDOKO PUZZLES 11 .
  12. 12. 12
  13. 13. 13 oSteganography in Text oSteganography in Images oSteganography in Audio Image steganography
  14. 14. 14
  15. 15. 15 AUDIO STEGANOGRAPHY
  16. 16. 16
  17. 17. 17 METHODS OF AUDIO STEGANOGRAPHY METHODS OF AUDIO STEGANOGRAPHY
  18. 18. 18
  19. 19. 19
  20. 20. 20 LSB CODINGLSB CODING
  21. 21. 21 Variation in choosing LSBVariation in choosing LSB
  22. 22. 22 TERMINOLOGY USED…TERMINOLOGY USED… • Cover : The data that is visible to the world. • Embedded: The data to be hidden (not visible to the world). • Stego: The data contains both cover and embedded data. • The data may be audio or video or image. • In case of audio data the cover is also termed as host signal, where as in case of image data the cover is termed as container. • The process of hiding the data is known as embedding.
  23. 23. 23
  24. 24. 24 WAV • WAV files are short for waveform audio files. • Microsoft and IBM first introduced the WAV file. • The Audio data after the sampling is done is stored in computer as a .wav file. • The average song has a large file size from 35 and 50 megabytes. • Most popular Audio Format. • Don’t lose any quality in recording.
  25. 25. 25
  26. 26. 26 Stego Audio Embedding Process LSB of the Data Part Alternate Samples of LSB Data Audio Input Separate Header and Data Secret Text BLOCK DIAGRAM EMBEDDING:
  27. 27. 27 Convert Binary to ASCII Extraction Process Store LSB of Data Part Left Shift of Previous bit Stego Audio Separate Header and Data Extracted Text Extracting:
  28. 28. 28 LETERSWITH ASCII VALUESAND CORRESPONDING BINARY VALUES Letter ASCII Value Corresponding Binary Value A 065 01000001 U 117 01110101 D 100 01100100 I 105 01101001 O 111 01101111 LETTERS WITHASCIIVALUES AND CORRESPONDING BINARY VALUES
  29. 29. 29 ALGORITHM (FOR EMBEDDING OF DATA): ALGORITHM (FOR EMBEDDING OF DATA): • Leave the header section of the audio file untouched. • Start from a suitable position of the data bytes. (For the experiment purpose the present start byte was the 51st byte). Edit the least significant bit with the data that have to be embedded. • Take every alternate sample and change the least significant bit to embed the whole message.
  30. 30. 30 SAMPLES OF AUDIO FILE WITH BINARY VALUES BEFORE ANDSAMPLES OF AUDIO FILE WITH BINARY VALUES BEFORE AND AFTER EMBEDDINGAFTER EMBEDDING Sample No. Binary values of corresponding sample Binary value to be embedded Binary values after modification 51 01110100 0 01110100 53 01011110 1 01011111 55 10001011 0 10001010 57 01111011 0 01111010 59 10100010 0 10100010 61 00110010 0 00110010 63 11101110 0 11101110 65 01011100 1 01011101
  31. 31. 31 • Leave first 50 bytes. • Start from the 51st byte and store the least significant bit in a queue. • Check every alternate sample and store the least significant bit in the previous queue with a left shift of the previous bit. • Convert the binary values to decimal to get the ASCII values of the secret message. • From the ASCII find the secret message. ALGORITHM (FOR EXTRACTING OF DATA): ALGORITHM (FOR EXTRACTING OF DATA):
  32. 32. 32 EXRACTION OF DATA FROM AUDIO FILE Sample No. Binary values with embedded secret data Bits that are stored in the queue 51 01110100 0 53 01011111 01 55 10001010 010 57 01111010 0100 59 10100010 01000 61 00110010 010000 63 11101110 0100000 65 01011101 01000001
  33. 33. 33
  34. 34. 34
  35. 35. 35 • Modern Printers: o HP and Xerox brand colour laser printers o Tiny yellow dots are added to each page. o The dots are barely visible and contain encoded printer serial numbers as well as date and time stamps.
  36. 36. 36 CorPorAte WorLd: In business world audio data hiding can be used to hide a secret chemical formula or plans for a new invention. ForensiC APPLiCAtions: to hide evidence audio steganography is used Anti-soCiAL eVents: Terrorists can also use Audio data hiding to keep their communications secret and to coordinate attacks.
  37. 37. 37 • Difficult to detect and only receiver can detect. • Avoid ability of degradation and robustness for audio signals. • Protection of Intellectual digital works. • Internet privacy. • Secret communication between the organization like border security force and organization.
  38. 38. 38 • Once algorithm known- confidentiality of information is lost. • Hackers may misuse the technique. • Due to distortion original signal may not be obtained.
  39. 39. 39 As EVERY COIN HAS TWO SIDES, this technology besides having many benefits to make the internet business very safe and transmitting the defense messages secretly, it is also a threat to the society if it is used by anti social elements. “It will be more helpful if this technology is used in a proper way. The Steganography which we are seeing today is just an ice cap, we have to wait until it melts (ie. developed fully) to decide whether it is helpful to the society or not.”
  40. 40. 40 HANKY OUT!!! THANK YOU
  41. 41. 41

×